IP AddressNetwork FingerprintLatencyTime & BehaviourHuman Factors
Deep Dive6 min read

What Your Employer Can Actually See When You Work Remotely

28 March 2026·by Belz

Most people only think about their IP address. There are actually five layers of detection and the non-technical ones are where people get caught.

You want to work from Lisbon for a month. Or spend the summer at your parents' place overseas. Your company says "work from home" but what they really mean is work from YOUR home, in the UK.

I've done this enough times to know that most people focus on the wrong thing. They think about their IP address and stop there. But corporate detection isn't one thing. It's five layers, and the ones that actually catch people out are the ones nobody talks about.

Layer 1: Your IP address

The obvious one. Every time your laptop connects to a company server or VPN, your IP gets logged. A foreign IP is a red flag.

Commercial VPNs don't fix this for work. Corporate IT can detect datacenter IPs because they're on known ranges. Some companies explicitly block them. NordVPN, ExpressVPN, doesn't matter. The IP belongs to a hosting company and that metadata is public.

What does fix it: routing through your own home network via a personal server running WireGuard. Your company sees your normal UK residential IP, same as always. Not a datacenter, not shared with anyone.

Your IP is the easiest layer to solve, but it's only one of five. Most people stop here and think they're covered.

Layer 2: Your network fingerprint

This is what most people miss. If your work laptop has endpoint management (Intune, Zscaler, CrowdStrike, corporate VPN) it can see more than just your IP:

  • Gateway IP - the address of your local router. At home it might be 192.168.1.1. In a Portuguese Airbnb it's whatever their router assigns.
  • MAC address - unique hardware identifier of the router you're connected to. Different router, different MAC.
  • Subnet and DHCP - network range, lease times, DNS suffix. Corporate tools compare these against your "normal" profile.

A basic VPN only changes your public IP. Your local network, the one your laptop is physically connected to, still looks foreign. The fix is a travel router configured to match your home network environment. For corporate tools you also need MAC address cloning, DHCP matching, and DNS blocking for Microsoft location services and telemetry.

This is the layer that separates a basic VPN setup from one that actually holds up under corporate endpoint management. If your company uses Intune or Zscaler, your IP alone isn't enough.

Layer 3: Latency

Connecting to UK servers from Bali adds 200-300ms round trip. From London it's 10-20ms. This is physics, you can't fix it.

It shows up in video call quality, VPN connection logs, and application performance metrics. Your company might not actively monitor this, but the data exists.

Western Europe is easy mode. Portugal, Spain, France, you're looking at maybe 30-50ms which is basically unnoticeable. SE Asia is where it gets tricky. If your company runs latency-sensitive tools or you're on video calls all day, think carefully about where you go.

Layer 4: Time and behaviour

Not technical monitoring, just pattern recognition:

  • Login times shifting. You usually log in at 8:30am, suddenly it's 5:30am because you're keeping UK hours from Thailand.
  • Calendar and Slack online hours changing.
  • Email headers sometimes include timezone info.

Fix: discipline. Keep your work laptop clock on UK time. Work UK hours. Be consistent. Your personal phone can stay on local time — this is about what your employer's tools see, not your whole life.

Layer 5: The human stuff

This is where most people actually get caught. Not by technology, by mistakes:

  • Background noise on calls. Tropical birds, call to prayer, street markets. Get a decent noise cancelling mic.
  • Social media. One instagram story from a beach cafe on a Tuesday afternoon — visible to colleagues. Location tags on accounts work people follow. Friends tagging you where your employer can see.
  • Package deliveries. HR sends you a new laptop. Where does it go?
  • Colleagues mentioning it in a group chat. Your tan in January.
  • Personal card transactions in a foreign currency. Not directly employer-visible, but if an investigation starts these things surface.
The technical setup is solvable. The human side is where people slip up — during work hours, on work-visible channels. A VPN doesn't fix an Instagram story your colleague sees.

What they probably actually monitor

Most companies don't have a team watching your IP logs in real time. What they typically have:

  • Corporate VPN logs that record your IP on connect. If IT reviews them (usually only when there's a reason to), a foreign IP stands out.
  • Endpoint management that collects device compliance data. May flag "unusual network" as non-compliant.
  • HR systems tied to your declared work location for tax and insurance.

The risk isn't usually real-time detection. It's that a record exists, and if someone has a reason to look, they'll find it. The whole game is giving nobody a reason to look.

What this doesn't cover

  • Legal and tax. Working from another country for extended periods can create tax obligations for you and your employer. That's a conversation with an accountant, not a blog post.
  • No setup guarantees your employer won't find out. The goal is reducing the digital trail. Social and operational factors matter just as much as the technical ones.
  • If your contract says "work from the UK only" then the technical setup doesn't change the contractual position. That's a decision you make for yourself.

Bottom line

Detection isn't one thing. It's five layers and most people only think about the first one. The tech side is very solvable. The harder part is being consistent about everything else.

In my opinion it's part of work life balance. If the work gets done and nobody can tell the difference, I don't see why where you sit should matter. But that's a personal call and every situation is different. Know your risks, cover your bases, and make an informed decision.

Want to check if this would work for your setup? Book a free briefing, no commitment.